FREE TO VIEW


« Back to News

2016-01-13

Is The Password Dead?

Will 2016 be the year when passwords become obsolete? Or will we just continue to grin and bear it? What’s the matter with passwords, anyway?

2016-01-13

Indian ‘Black Hats' Hack Pakistani Websites

A group of Indian hackers hacked and vandalized seven Pakistani websites including that of Pakistani Lawyers' Bar Council.

2016-01-18

Top 2016 Big Data Challenges: Skills Shortage

In 2016, big data will lend support to almost every function of a business. But there is a huge organisational challenge to staff big data projects.

2016-01-13

Cyber Security In Modern Railways

Railways are part of national critical infrastructure. New research identifies a long list of security issues affecting railroad systems.

2016-01-12

Ukrainian Power Grid Hack

Were Russian government hackers behind a successful cyber attack on the Ukrainian power grid last month?

2016-01-11

TalkTalk Hack Revisted

After the TalkTalk hack, what can be learnt to help other companies prevent a similar situation? Opinion By Max Vetter

2016-01-14

Islamic State Launches A Cyber War Magazine

Islamic State has launched a magazine, 'Kybernetiq' to guide jihadists on how to take part in 'cyber war' including encryption & messaging.

2016-01-12

USA 2016: How Will Snowden Vote?

Edward Snowden is still a US citizen and eligible to vote in the presidential election, even from exile in Russia. Democrat or Republican?

2016-01-14

Britain's Nuclear Subs In Cyber War

Britain's new submarine fleet will be equipped with the latest deadly nuclear missiles. Could they be rendered impotent by cyber warfare?

2016-01-11

Investing In Artificial Intelligence

Artificial intelligence is one of the most exciting and transformative opportunities of our time. Here's why investors are piling in.

2016-01-04

China Passes Controversial Counter-terrorism Law

China passes anti-terrorism laws that requires technology firms to help decrypt information and permits the military to pursue terrorists overseas.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.